Jump to content

Search the Community

Showing results for tags 'mac'.

More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • MSPGeek
    • Announcements
    • The Geek Cast
  • ConnectWise Automate / Labtech
    • ConnectWise Automate / LabTech
    • ConnectWise Automate / LabTech - Development


  • ConnectWise Automate
    • Scripts
    • Plugins
    • SQL Snippets
    • Role Definitions
    • Automate PowerShell Code
    • Reports
    • Internal Monitors
    • Remote Monitors
  • ConnectWise Manage
    • API Interacting Code

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start



About Me


Agent Count













Found 8 results

  1. Does anyone have a working AV Definition configuration for ESET Endpoint Antivirus on a Mac? I have tried a few combinations today, but can't get it working. I found a post from 2013, which mentioned LT Support had informed it was not possible to monitor AV on OSX, but it was a long time ago now, so hoping that has been resolved! Below is what I have tried. Thanks Kev
  2. Hey Guys! Has anyone had any luck creating an agent uninstaller script for Mac endpoints?
  3. Is there a way to force Labtech to see the agent as a server instead of just a workstation, aside from installing the Mac Server software package? Thanks, Stephen
  4. Hey All, We are running into an issue with machines running the latest version of OSX (10.13) Apple has enabled a feature blocking apps that touch the kernel (Eset in our case), and make you click a couple buttons to allow it. May not seem like a big deal on the face, but tracking down users and clicking a couple buttons on over 100 machines is going to become a lot of work fairly quickly Her is the Eset and Apple KBs: https://developer.apple.com/library/content/technotes/tn2459/_index.html#//apple_ref/doc/uid/DTS40017658 https://support.eset.com/kb6512/ Eset just told me they don't have a workaround. I wanted to know if you guys have any ideas on getting around this in an automated fashion. Thanks, Stephen
  5. How are other people with Webroot monitoring for threat detections on Macs? The 3.0 plugin does not pull detection data from the GSM console into the plugin_webroot3_threathistory table (as it does for PC's), and thus the "Webroot 3 - Active Infection" monitor never triggers for Macs. Webroot support confirmed this is expected behavior (since the mac client isn't "fully supported" yet).
  6. Has anyone had any luck writing a LT Script that will copy a URL file to a Mac OS desktop? Or create the URL shortcut some other way using Labtech?
  7. I've noticed lately that a lot of the time when I run commands against Mac OS X endpoints, the shell returns "OK" rather than the expected result of the command. For example: ls /Applications OK This happens when running commands interactively as well as when the commands are executed by a script - I enable script engine logging (and even explicitly log %shellresult% to the console) and the same thing happens: a long list of comments on what the command is doing, with "OK"s between them. Does anyone know why this is happening and/or how to fix it? Some Mac endpoints respond fine to shell commands, but then stop. Others have a chain of "OK" entries in recent history but then respond fine to interactive commands when I test them. Makes no sense to me.
  8. Hi we are looking to address a critical security flaw lets anyone gain root access to a Mac running macOS High Sierra. We would like to make sure the root account is set with a password as that is the recommended best solution for anyone running OS High Sierra. Any thoughts on how one may be able to achieve this from the dashboard? When I check System > Users the user box is blank. Here is an article discussing the security flaw: http://bgr.com/2017/11/28/macos-high-sierra-login-bug-hack-how-to-fix/
  • Create New...